Posted on 09/16/2001 8:21:38 AM PDT by robnoel
Is it not ironic that the head of the FBI and the Clinton admin spent 8 years going after Americans...as Gary Aldrich pointed out yesterday
We were even given a new set of "enemies" to consider. Call it a distraction. We were told that the real threat was not from some Islamic fundamentalists who vowed to commit terrorist acts to bring us to our knees. No, Bill Clinton and Janet Reno and their friends on Capitol Hill and in the media spoke as one voice about the home-grown threat posed by church-going Americans, protesting against partial birth abortion.
And then they demonized well-organized militia groups with - gasp - actual guns! who were complaining about Clinton's liberal agenda. They were considered suspicious because they expressed absolute disgust for our Commander in Chief.
I submit these same bearded, flannel-shirted "suspicious characters" are now running the backhoes and girder cutters in New York City, working around the clock until they drop from exhaustion, attempting to do what real Americans have always done.
Meanwhile, the "girly-men" Liberals and their strident molls scratch their heads and wonder how and why Tuesday happened. After all, weren't they nice to these terrorists? Didn't they display the correct amount of tolerance for another peoples' religious beliefs? Didn't Hillary Clinton actually embrace and kiss Arafat's wife?
From a Salon piece..The hyping of domestic terrorism
Just over a year ago, on Feb. 4, 1999, Freeh testified on the subject of terrorism before the Senate Appropriations Committee's Subcommittee on the departments of Commerce, Justice and State. Freeh's testimony was overlooked in every news account this week, but his detailed evaluation makes the Bremer Commission's hold on reality appear tenuous. "The frequency of terrorist incidents in the United States has decreased in number," Freeh emphasized. Since the World Trade Center bombing of 1993, Freeh pointed out, "no single act of foreign-directed terrorism has occurred on American soil."
Support for violent revolutionaries emanating from Cuba and North Korea, he noted, "appear to have declined" with those nations' economic free falls. Even the American cells of violent Middle East political movements as Hamas and Hezbollah, Freeh declared, are devoted exclusively to "fundraising and low-level intelligence gathering."
Just how much terrorism is not much? Freeh testified that in fiscal 1998, the FBI prevented 10 planned "terrorist acts." Not one emanated from abroad. Nine of the 10 "terrorist acts" were planned by a single, small cluster of Illinois white supremacists hoping to assassinate Holocaust scholar Simon Wiesenthal and Morris Dees, the anti-Klan crusader who runs the Southern Poverty Law Center. The other forestalled attack involved a lone individual, a militia type, from Washington state.
Foreign students did not figure in Freeh's account at all. Indeed, Freeh told Congress that the main threat of terrorist violence comes not from foreign sources but from the overlapping constituencies of the far right: abortion-clinic assassins, Christian Identity militias and the like.
Talk about a blown call :-)
And then they demonized well-organized militia groups with - gasp - actual guns! who were complaining about Clinton's liberal agenda. They were considered suspicious because they expressed absolute disgust for our Commander in Chief.
I submit these same bearded, flannel-shirted "suspicious characters" are now running the backhoes and girder cutters in New York City, working around the clock until they drop from exhaustion, attempting to do what real Americans have always done.
Balderdash. Cite:
We are, to those that attack us. Make your peace with the loon-god Allah, Bin Laden. You're about to meet him.
Church today was PACKED.
Oh brother. Get real. You are now an official member of the Free Republic Club for Those Who Hate Americans and America First. Keep up the bad work.
You spent uncounted hours at the keyboard alibying Starr too.
Most now understand the true nature of that smarmy hypocrite. He had every oportunity to stop Clinton cold. He had evidence that he chose not to present that would have proven the Clinton's criminality. Instead he went after the adultery/affair bit, and failed at that.
Now you defend another in the image of the maggot Starr. With the same type of tunnel vision that he had. Useful idiots is what both of them are. And your support of them puts you in the same category.
"Those Who Hate Americans and America First." You may CALL Starr and Freeh Americans, but many of us call them Traitors.
FBI Probes Espionage at Clinton White House - Insight Magazine
"If spies wanted to penetrate the White House, a facility widely considered the most secure in the world, how might it be done? For that matter, how might any agency or department of government be penetrated by spies?
Actually, its pretty easy if you know what youre doing, says a retired U.S. intelligence expert who has helped (along with other government sources) to guide Insight through the many and often complicated pathways of government security and counterespionage.
Access to designs, databases, blueprints, memos, telephone numbers, lists of personnel and passwords all can be obtained. And from surprising sources. Several years ago this magazine was able to review from a remote site information on the supposedly secret and inaccessible White House Office Data Base, or WHODB (see More Personal Secrets on File @ the White House, July 15, 1996).
Despite the spending of additional millions to beef up security when the White House installed a modern $30 million computerized telephone system a few years ago, communications security remains a big problem. Whatever the level of sophistication employed, there are soft underbellies that raise significant national-security problems. And potential for espionage, such as electronic intercepting of phone calls, is very great.
Calls to or from the White House dealing with classified information are supposed to be handled on secure lines, but it doesnt always happen. Sometimes, according to Insights sources, despite the existence of special phones at the White House and elsewhere to handle such calls, some dont use them or only one side of the call does. An Insight editor recently was allowed for demonstration purposes to overhear a conversation placed over an unsecured line involving a classified topic.
Carelessness always has been a problem, but former and current FBI special agents say that under the Clinton administration the disregard for security has been epidemic. Many officials simply dont like the bother of communicating on secure phones.
In another instance, Insight was provided access to virtually every telephone number within the White House, including those used by outside agencies with employees in the complex, and even the types of computers used and who uses them. Just by way of illustration, this information allowed direct access to communications instruments located in the Oval Office, the residence, bathrooms and grounds.
With such information, according to security and intelligence experts, a hacker or spy could target individual telephone lines and write software codes enabling the conversations to be forwarded in real-time for remote recording and transcribing. The White House complex contains approximately 5,800 voice, fax and modem lines.
Having a phone number in and of itself will not necessarily gain you access for monitoring purposes, Insight was told by a senior intelligence official with regular contact at the White House. The systems are designed to electronically mask routes and generate secure connections. That said, coupling a known phone number to routing sequences and trunk lines would pose a security risk, this official says.
Add to that detailed knowledge of computer codes used to move call traffic and your hacker or spy is in a very strong position. Thats why we have so many redundancies and security devices on the systems so we can tell if someone is trying to hack in, says a current security official at the White House.
Shown a sampling of the hoard of data collected over just a few months of digging, the security officials face went flush: How the hell did you get that! This is what we are supposed to guard against. This is not supposed to be public.
Indeed. Nor should the telephone numbers or locations of remote sites or trunk lines or other sundry telecommunications be accessible. Whats surprising is that most of this specialized information reviewed by Insight is unclassified in its separate pieces. When you put it together, the solved puzzle is considered a national-security secret. And for very good reason.
Consider the following: Insight not only was provided secure current phone numbers to the most sensitive lines in the world, but it discovered a remote telephone site in the Washington area which plugs into the White House telecommunications system.
Given national-security concerns, Insight has been asked not to divulge any telephone number, location of high-security equipment, or similar data not directly necessary for this news story.
Concerning the remote telecommunications site, Insight discovered not only its location and access telephone numbers but other information, including the existence of a secret back door to the computer system that had been left open for upward of two years without anyone knowing about the security lapse. This back door, common to large computer systems, is used for a variety of services, including those involving technicians, supervisors, contractors and security officers to run diagnostic checks, make repairs and review system operations.
This is more than just a technical blunder, says a well-placed source with detailed knowledge of White House security issues. This is a very serious security failure with unimaginable consequences. Anyone could have accessed that [back door] and gotten into the entire White House phone system and obtained numbers and passwords that we never could track, the source said, echoing yet another source familiar with the issue."
Maybe somebody ought to send that quote as a singing telegram to Cheeney, or Bush, or....... Mueller so they get a Hint where the secret passwords that were used to pass on a threat might have come from.
Ask yourself what you'd have done if you had been herded and unarmed and on any one of those four planes.
Because the unpleasant fact is this: herded and unarmed is what you'll be the next time you get on a plane - whenever planes start flying again. You'll still be depending solely on your well-meaning public servants and their minions to protect you, no matter how poorly they've done so in the past, culminating in yesterday's disastrous failure - which could have likely been prevented, and tens of thousands of lives probably saved, by having, at the very least, armed and trained pilots and flight attendants on the doomed planes.
And no doubt you'll soon be hearing again how and why your public servants can "protect" you way better than you can. Diane Feinstein, Joe Lieberman, John McCain,Charles Schumer, Hillary Clinton, Sarah Brady, Rosie O'Donnell - all of them smug and protected bytheir personal armed guards, many of these guards paid for by your tax dollars -will still be trying to pass laws to disarm you and to strip you of your right to self-defense, to make you more dependent on the kind of "security" that permitted the kamikaze scum who declared war on us yesterday to do what they did.
Someone had better be looking hard and long into the real crimes committed against America in the past decade...
The ones that allowed this to come to pass.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.